{"id":"https://openalex.org/W4297911739","doi":"https://doi.org/10.1109/iccc55456.2022.9880638","title":"Trade-off between Secrecy Rate and Energy Consumption in a Secure UAV- MEC System","display_name":"Trade-off between Secrecy Rate and Energy Consumption in a Secure UAV- MEC System","publication_year":2022,"publication_date":"2022-08-11","ids":{"openalex":"https://openalex.org/W4297911739","doi":"https://doi.org/10.1109/iccc55456.2022.9880638"},"language":"en","primary_location":{"id":"doi:10.1109/iccc55456.2022.9880638","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccc55456.2022.9880638","pdf_url":null,"source":{"id":"https://openalex.org/S4363608039","display_name":"2022 IEEE/CIC International Conference on Communications in China (ICCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100338178","display_name":"Wenwen Li","orcid":"https://orcid.org/0000-0003-1868-1302"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenwen Li","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks,China","Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks,China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057174728","display_name":"Zhiqun Hu","orcid":"https://orcid.org/0000-0002-5666-1401"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqun Hu","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks,China","Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks,China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000851572","display_name":"Xiangming Wen","orcid":"https://orcid.org/0000-0003-2793-6696"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangming Wen","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks,China","Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks,China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019111566","display_name":"Zhaoming Lu","orcid":"https://orcid.org/0000-0002-0182-1770"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoming Lu","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks,China","Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks,China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100326139","display_name":"Yujing Zhang","orcid":"https://orcid.org/0000-0002-0353-0467"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yujing Zhang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks,China","Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks,China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100338178"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":1.111,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.77432543,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"862","last_page":"867"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8164172172546387},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.7505947351455688},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.6869946122169495},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5194051265716553},{"id":"https://openalex.org/keywords/convex-optimization","display_name":"Convex optimization","score":0.47595497965812683},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4611423909664154},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4550841450691223},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4315378665924072},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.4292010962963104},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4278843402862549},{"id":"https://openalex.org/keywords/mobile-edge-computing","display_name":"Mobile edge computing","score":0.4237178862094879},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.41310831904411316},{"id":"https://openalex.org/keywords/regular-polygon","display_name":"Regular polygon","score":0.19320279359817505},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.17487603425979614},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13228154182434082},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10100612044334412},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09026128053665161},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.06926187872886658}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8164172172546387},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.7505947351455688},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.6869946122169495},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5194051265716553},{"id":"https://openalex.org/C157972887","wikidata":"https://www.wikidata.org/wiki/Q463359","display_name":"Convex optimization","level":3,"score":0.47595497965812683},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4611423909664154},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4550841450691223},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4315378665924072},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.4292010962963104},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4278843402862549},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.4237178862094879},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.41310831904411316},{"id":"https://openalex.org/C112680207","wikidata":"https://www.wikidata.org/wiki/Q714886","display_name":"Regular polygon","level":2,"score":0.19320279359817505},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17487603425979614},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13228154182434082},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10100612044334412},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09026128053665161},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.06926187872886658},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccc55456.2022.9880638","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccc55456.2022.9880638","pdf_url":null,"source":{"id":"https://openalex.org/S4363608039","display_name":"2022 IEEE/CIC International Conference on Communications in China (ICCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.9100000262260437}],"awards":[{"id":"https://openalex.org/G5332247906","display_name":null,"funder_award_id":"L192034,61901163","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2219490794","https://openalex.org/W2899183567","https://openalex.org/W2908537295","https://openalex.org/W2963061782","https://openalex.org/W2981262799","https://openalex.org/W3089147436","https://openalex.org/W3095406007","https://openalex.org/W3159850512","https://openalex.org/W3185787010"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2107199751","https://openalex.org/W4243812570","https://openalex.org/W4300441478","https://openalex.org/W2062965938","https://openalex.org/W3048663290"],"abstract_inverted_index":{"Unmanned":[0],"aerial":[1],"vehicles":[2],"(UAV)":[3],"used":[4],"as":[5],"the":[6,23,51,70,77,91,96,100,106,112,116,120,126,142,152,160,172],"mobile":[7],"edge":[8],"computing":[9],"(MEC)":[10],"platform":[11],"is":[12,20,130,148],"capable":[13],"of":[14,25,76,95,103,108,115,123],"providing":[15],"flexible":[16],"offloading":[17,52],"tasks,":[18,53,125],"but":[19],"also":[21,131],"facing":[22],"risk":[24],"being":[26],"wiretapped":[27],"by":[28,44,167],"nearby":[29],"eavesdroppers":[30],"(Eves).":[31],"In":[32],"this":[33,135],"paper,":[34],"we":[35,82],"investigate":[36],"a":[37,84],"full-duplex":[38],"UAV":[39,118],"to":[40,89,150],"interfere":[41],"with":[42,60],"Eves":[43],"sending":[45],"jamming":[46,64],"signals":[47],"while":[48,98],"simultaneously":[49],"processing":[50],"which":[54],"saves":[55],"more":[56],"resources":[57],"overhead":[58],"compared":[59],"introducing":[61],"an":[62,137],"extra":[63],"UAV.":[65],"To":[66,133],"trade":[67],"off":[68],"between":[69],"secrecy":[71,93],"rate":[72,94],"and":[73,119],"energy":[74,102,113],"consumption":[75,114],"secure":[78],"UAV-enabled":[79],"MEC":[80],"system,":[81],"formulate":[83],"multi-objective":[85,128],"optimization":[86],"problem":[87,129],"aiming":[88],"maximize":[90],"average":[92],"system":[97],"consuming":[99],"minimum":[101],"users.":[104],"With":[105],"constraints":[107],"task":[109],"latency":[110],"requirement,":[111],"legitimate":[117],"maximum":[121],"capacity":[122],"self-executed":[124],"proposed":[127,149,169],"non-convex.":[132],"solve":[134],"issue,":[136],"alternating":[138],"algorithm":[139,170],"based":[140],"on":[141],"successive":[143],"convex":[144],"approximating":[145],"(SCA)":[146],"method":[147],"optimize":[151],"parameters":[153],"iteratively.":[154],"The":[155],"simulation":[156],"results":[157],"demonstrate":[158],"that":[159],"significant":[161],"performance":[162],"improvement":[163],"can":[164],"be":[165],"achieved":[166],"our":[168],"over":[171],"baseline":[173],"schemes.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
